0% found this document useful (0 votes)
43 views

Infrastructure Tracks

This document outlines the admission process, program structure, and offerings for infrastructure tracks at an educational institution. It discusses: 1. The admission process which involves 3 phases including exams, interviews and a review by the board to select candidates. 2. The program content structure which allocates 84% of time to core courses in topics like networking, security and system administration, with 11% allotted to fundamental courses and 5% to soft skills. 3. The programs offered including a 9-month professional training program in cyber security and cloud architecture, as well as intensive training, online services and camps for undergraduates focused on related fields.

Uploaded by

abdlwhapahmed12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Infrastructure Tracks

This document outlines the admission process, program structure, and offerings for infrastructure tracks at an educational institution. It discusses: 1. The admission process which involves 3 phases including exams, interviews and a review by the board to select candidates. 2. The program content structure which allocates 84% of time to core courses in topics like networking, security and system administration, with 11% allotted to fundamental courses and 5% to soft skills. 3. The programs offered including a 9-month professional training program in cyber security and cloud architecture, as well as intensive training, online services and camps for undergraduates focused on related fields.

Uploaded by

abdlwhapahmed12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Infrastructure Tracks

Content

Program 1. Who May Apply?


Admission 2. Prerequisites
3. Selection Process
Arrangement
4. Delivery Approach
5. Student’s Deliverables

Market Needs 1. Programs Offered


and Stakeholders 2. Industry/Academy Stakeholders
3. Targeted Outcome
4. Certification
5. Graduates Job Profiles

Services & 1. Professional Training Program


Content 2. Intensive Code Camps
3. Undergrads Summer Camps
4. Online Services

Moving Partners’ Feedback


Forward

2
Program Admission Arrangement

Who May Apply?


Graduates of:
• Computer Engineering,
• Communications Engineering
• Computer Science
Prerequisites
These topics will be discussed with you in the interviews (Resources applicants can visit or study before interview)
• Introduction to computer networks
https://maharatech.gov.eg/course/view.php?id=37
• Introduction to cybersecurity
• https://maharatech.gov.eg/course/view.php?id=37
• Vmware Foundation
https://maharatech.gov.eg/course/index.php?categoryid=228

ITI values that could be found here: http:// www.iti.gov.eg/Site/AboutUs

Selection Process
• PH01 – Phase 1
IQ Test | English Test | Problem Solving Exam
• PH02 – Phase 2
Applicants who pass the above exams will be promoted to technical and interpersonal skills interview. Those applicant would be discussing
with the interviewing panel their pre-work -“Before You Apply”- in a one to one interview
• PH03 – Phase 3
A second level interview would be held with ITI board members
Delivery Approach
• 75% face to face Learning| 25 % Online
• Common Hardware
• Common Software
Student deliverables
• Students must deliver internaltional certficates based on his track .
3
Infrastructure Tracks
4 Certifications
E-Learn Security
Governance , Risk , Compliance Professional
1 Programs Offered VMware (VCP)
 PTP MS (AZURE)
Cyber Security engineer Amazon (AWS)
Cloud Architecture Red hat (RHCSA)
Fortinet (NSE 4)
System Administration
 Intensive Training
Cyber Security Associate 5 Graduates Job Profiles
System Admin Systems Administrator
Data Center Engineer An individual who carries the responsibility of overseeing the smooth operation of a computer network
Offensive Security & Pen Testing for an organization. They make sure that mail servers are functioning properly, plan networks and
cyber incident responder oversee their installation, maintain and upgrade software, support users in smaller organizations,
monitor security tools and handle the installation, distribution, control and removal of hardware. A
 Online Services (MaharaTech, ITI Tech Leap) System Administrator also maintains the internet connection and firewall. They often support other
 Cyber sec. camp for undergrads (midyear and divisions in the organization that occasionally integrate with the IT department.
Cyber Security Associate
summer).
is an essential part of any large (and many mid-sized) business' overall technology team. A network
security engineer is involved in the provisioning, deployment, configuration, and administration of
Industry/Academy many different pieces of network-and security-related hardware and software. These include firewalls,
2 routers, switches, various network monitoring tools, and VPNs (virtual private networks). These
Stakeholders engineers also regularly perform network-based security risk assessments
VMware IT Academy Data Center Engineer
RedHat Academy is responsible for designing, setting up, and managing information/network systems at data
EG-cert Kaspersky centers.Their job description entails monitoring systems operations and administering IT solutions to
Palo alto ensure servers, hard drives, and other data center equipment function efficiently.
Fortinet
Cisco Penetration Testers
Huawei can be considered ethical hackers, as they try to break into computers and networks in order
3 Targeted Outcome to find potential security breaches. Penetration Testers duties include running tests, writing
Employability reports about their findings, designing new tests, and running security audits.
Vodafone Egypt, VOIS, Orange Egypt, OBS, Etisalat Misr.
NBE, AlexBank, AAIB, Fawry, Aman. Valeo,CyShield, ZINAD cyber incident responder main responsibility is to respond to security disruptions, threats, and
incidents. He/she works on investigating and analyzing different logs, traffics and devices using a
suite of forensic tools and analysis techniques. Incident responder works also to identify the damage,
put remediation and containment plan and advice with recommendations to improve existing controls
9-Months Professional Training Program

5
Program Content Structure
Cyber Security
9-Months Professional Training Program

Fundamental courses Core Courses 1290 Hours


Cisco Internetworking Fundame Soft
Track Orientation Workshop
ntal Skills
Database Fundamentals Cisco Network Associate
Courses 5%
Operating Systems Fundamentals Microsoft Windows Active Directory
11%
Introduction to Programming Microsoft Windows Infrastructure
Client-Side Technologies Fundamentals Red Hat System Administration I
Introduction to PHP Programming Red Hat System Administration II
Introduction to Python Programming Red Hat System Administration III
Ethical Hacking and Security Assessment Core
MySQL Database courses
Firewalls Technologies
Incident Handling 84%
Computer and Network Forensics
Soft Skills Courses Introduction to bug hunting
Introduction to Virtual Private Networks
Progressive Teamwork (Workshop) Malware Analysis and Reverse Engineering
Professional Demeanor (Workshop) Metasploit Essentials
Communication Essentials for Professionals Mobile Penetration Testing
High Impact Presentations Risk Assessment and Compliance
Job Seeking Skills Web Penetration Testing
Freelancing Basics Windows Security
ITIL Foundation

6
Program Content Structure
Cloud Architecture
9-Months Professional Training Program

Fundamental courses Core Courses 1266 Hours


Cisco Network Associate Fundame Soft
Track Orientation Workshop
ntal Skills
Database Fundamentals Cisco Internetworking
Courses 5%
Operating Systems Fundamentals Data Center Infrastructure design
12%
Python Programming Microsoft Windows Infrastructure
MySQL Database Microsoft Windows Active Directory
Red Hat System Administration I
Red Hat System Administration II
Red Hat System Administration III Core
Bash Shell Script courses
Information Storage and Management 83%
Introduction to Big Data and Hadoop
Soft Skills Courses Infrastructure As a Code (IaaC)
Data Center Technologies
Progressive Teamwork (Workshop) OpenStack Deployment and Operation I
Professional Demeanor (Workshop) VMware vSphere: Install, Configure and Manage
Best Practices For Remote Working (Workshop) Vmware NSX
Communication Essentials for Professionals OpenStack Deployment and Operation II
High Impact Presentations Veeam Backup and Replication
Job Seeking Skills Docker Fundamentals
AWS SysOps Administration
Devops Fundamentals
freelancing basics
Microsoft Azure
ITIL foundation

7
Program Content Structure
System Administration
9-Months Professional Training Program

Fundamental courses Core Courses 1320 Hours


Data Structures and Algorithms Fundame Soft
Track Orientation Workshop
ntal Skills
Database Fundamentals Red Hat System Administration I
Courses 5%
Operating Systems Fundamentals Red Hat System Administration II
12%
Introduction to Programming Red Hat System Administration III
Red Hat High Availability Clustering
Oracle Solaris Administration
Bash Shell Script
Python Programming Core
Object Oriented Programming using Python courses
Web Server Administration 83%
Network Security Fundamentals
Soft Skills Courses Network Design and Implementation
Advanced switching design and Implementation
Progressive Teamwork (Workshop) Advanced routing design and Implementation
Professional Demeanor (Workshop) Ansible
Communication Essentials for Professionals Container Engine
High Impact Presentations Continuous Deployment and Integration
Job Seeking Skills Systems Operations on AWS
Version Control Systems
Virtualization Technologies
Introduction to Oracle SQL and PL/SQL
Oracle DBA I
Oracle DBA II
Microsoft Windows Infrastructure
Information Storage and Management
Introduction to Kubernetes
Agile Software Development Methodologies
ITIL Foundation

You might also like